Data Management Projects at Google

Total Page:16

File Type:pdf, Size:1020Kb

Data Management Projects at Google Data Management Projects at Google Michael Cafarella Edward Chang Andrew Fikes Alon Halevy Wilson Hsieh Alberto Lerner Jayant Madhavan S. Muthukrishnan 1. INTRODUCTION values in the form’s fields. Since web crawlers primarily rely This article describes some of the ongoing research projects on hyperlinks to discover web pages, they are unable to reach related to structured data management at Google today. pages on the Deep Web that are subsequently not indexed The organization of Google encourages research scientists by search engines. The Deep Web has been acknowledged to work closely with engineering teams. As a result, the as a significant gap in the coverage of search engines and research projects tend to be motivated by real needs faced various accounts have hypothesized the Deep Web to have by Google’s products and services, and solutions are put an much more data than the currently searchable World into production and tested rapidly. In addition, because of Wide Web. Included in the Deep Web are a large number the sheer scale at which Google operates, the engineering of high quality sites, such as store locators and government challenges faced by Google’s services often require research sites. Hence, we would like to extend the coverage of the innovations. Google search engine to include web pages from the Deep In Google’s early days, structured data management was Web. mostly needed for storing and serving data related to ads. There are two complementary approaches to offering ac- However, as the company grows into hosted applications and cess to Deep Web content. The first approach, essentially the analyses performed on its query streams and indexes get a data integration solution, is to create vertical search en- more sophisticated, structured data management is becom- gines for specific domains (e.g., cars, books, real-estate). In ing a key infrastructure in all parts of the company. this approach we could create a mediator form for the do- What we describe below is a subset of ongoing projects, main at hand and semantic mappings between individual not a comprehensive list. Likewise, there are others who are data sources and the mediator form. At web-scale, this ap- involved in structured data management projects, or have proach suffers from several drawbacks. First, the cost of contributed to the ones described here, some of whom are building and maintaining the mediator forms and the map- Roberto Bayardo, Omar Benjelloun, Vignesh Ganapathy, pings is high. Second, identifying the domain, and the forms Yossi Matias, Rob Pike and Ramakrishnan Srikant. within the domain, that are relevant to a keyword query is Sections 2 and 3 describe projects whose goal is to enable extremely challenging. Finally, data on the web is about search on collections of structured data that exist today on everything and domain boundaries are not clearly definable, the web. Section 2 describes our efforts to crawl content that not to mention the many different languages – creating a resides behind forms on the web, and Section 3 describes mediated schema of everything will be an epic challenge. our initial work on enabling search on collections of HTML The second approach, sometimes called the surfacing ap- tables. Section 4 describes work on mining large collections proach, pre-computes the most relevant form submissions of data and social graphs. Sections 5 and 6 describe recent for all interesting HTML forms. The URLs resulting from progress on BigTable, our main infrastructure for storing these submissions can then be indexed like any other HTML structured data. page. Importantly, this approach enables leveraging the ex- isting search engine infrastructure and hence the seamless inclusion of Deep Web pages into web search results and 2. CRAWLING THE DEEP WEB this leads us to prefer the surfacing approach. We note that Jayant Madhavan and Alon Halevy our goal is to drive new traffic to Deep Web sites that until The Deep Web refers to content hidden behind HTML now were visited only if people know about the form or if forms. In order to get to a web page from the Deep Web, the form itself came up in a search result. Consequently, it a user has to perform a form submission with valid input is not crucial that we obtain all the possible form submission from these sites, but just enough to drive more traffic. Fur- thermore, our pre-computed form submissions function like a seed to unlocking the site – once an initial set of pages are in the index, the crawling system will automatically leverage the internal structure of the site to discover other pages of interest. We have developed a surfacing system at Google that has already enhanced the coverage of our search index to include web pages from over a million HTML forms. We are sub- 34 SIGMOD Record, March 2008 (Vol. 37, No. 1) sequently able to drive over a thousand queries per second lows the content providers to give lists of URLs in XML files from the Google.com search page to Deep Web content. to search engines, and therefore expose content behind from In deploying our solution, we had to overcome several chal- the deep web. All major search engines today support the lenges. First, a large number of forms have text box inputs site maps protocol described in www.sitemaps.org. The con- and require valid inputs values to be submitted. Therefore, tent provided by site maps tends to be complimentary to the the system needs to choose a good set of values to submit in content that is automatically crawled using the techniques order to surface the most useful result pages. We use a com- described above. bination of two approaches to address this challenge. For search boxes, which accept most keywords, we predict good candidate keywords by analyzing the content of already in- 3. SEARCHING HTML TABLES dexed pages of the website. For typed text boxes, that only Michael Cafarrela and Alon Halevy accept a well-defined set of values, we attempt to match the The World-Wide Web consists of a huge number of un- type of the text box against a library of types that are ex- structured hypertext documents, but it also contains struc- tremely common across domains, e.g., zip codes in the US. tured data in the form of HTML tables. Some of these ta- Second, HTML forms typically have more than one input bles contain relational-style data, with tuple-oriented rows and hence a naive strategy of enumerating the entire Carte- and a schema that is implicit but often obvious to a human sian product of all possible inputs can result in a very large observer. Indeed, these HTML tables make up the largest number of URLs being generated. Crawling too many URLs corpus of relational databases that we are aware of (number- will drain the resources of a search engine web crawler while ing more than 100M databases, with more than 2M unique also posing an unreasonable load on web servers hosting the schemas). The WebTables project is an effort to extract HTML forms. Interestingly, when the Cartesian product is high-quality relations from the raw HTML tables, to make very large, it is likely that a large number of the form sub- these databases queryable, and to use this unique dataset to missions result in empty result sets that are useless from build novel database applications. an indexing standpoint. For example, the search form on The first WebTables task is to recover high-quality rela- cars.com has 5 inputs and a Cartesian product will yield over tions from a general web crawl. Relation recovery includes 200 million URLs, even though cars.com has only 650,000 two steps: first, WebTables filters out raw HTML tables that cars on sale. We have developed our algorithm that intel- do not carry relational data (such as those used for page lay- ligently traverses the search space of possible form submis- out). Second, for those tables that pass the relational filter, sions to identify only the subset of input combinations that WebTables recovers schema metadata such as column types are likely to be useful to the search engine index. On aver- and labels. There is no way for an HTML author to reli- age, we only generate a few hundred form submissions per ably indicate whether a table is relational, or to formally form. Furthermore, we believe the number of form submis- declare relational metadata. Instead, WebTables must rely sions we generate is proportional to the size of the database on a host of implicit hints. For example, tables that are used underlying the form site, rather than the number of inputs for page layout will often contain very long and text-heavy and input combinations in the form. cells, whereas tables for relational data will usually contain Third, our solutions must scale and be domain indepen- shorter cells of roughly consistent length. Similarly, one way dent. There are millions of potentially useful forms on the to test whether a table author has inserted a “header row” web. Given a particular form, it might be possible for a hu- is to see if the first row is all strings, with different types in man expert to determine through laborious analysis the best the remaining rows. possible submissions for that form, but such a solution would The second WebTables challenge is to design a query tool not scale. Our goal was to find a completely automated so- that gives easy access to more than a hundred million unique lution that can be applied to any web form in any language databases with more than 2 million unique schemas.
Recommended publications
  • The Google File System (GFS)
    The Google File System (GFS), as described by Ghemwat, Gobioff, and Leung in 2003, provided the architecture for scalable, fault-tolerant data management within the context of Google. These architectural choices, however, resulted in sub-optimal performance in regard to data trustworthiness (security) and simplicity. Additionally, the application- specific nature of GFS limits the general scalability of the system outside of the specific design considerations within the context of Google. SYSTEM DESIGN: The authors enumerate their specific considerations as: (1) commodity components with high expectation of failure, (2) a system optimized to handle relatively large files, particularly multi-GB files, (3) most writes to the system are concurrent append operations, rather than internally modifying the extant files, and (4) a high rate of sustained bandwidth (Section 1, 2.1). Utilizing these considerations, this paper analyzes the success of GFS’s design in achieving a fault-tolerant, scalable system while also considering the faults of the system with regards to data-trustworthiness and simplicity. Data-trustworthiness: In designing the GFS system, the authors made the conscious decision not prioritize data trustworthiness by allowing applications to access ‘stale’, or not up-to-date, data. In particular, although the system does inform applications of the chunk-server version number, the designers of GFS encouraged user applications to cache chunkserver information, allowing stale data accesses (Section 2.7.2, 4.5). Although possibly troubling
    [Show full text]
  • A Review on GOOGLE File System
    International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 4, Jul - Aug 2016 RESEARCH ARTICLE OPEN ACCESS A Review on Google File System Richa Pandey [1], S.P Sah [2] Department of Computer Science Graphic Era Hill University Uttarakhand – India ABSTRACT Google is an American multinational technology company specializing in Internet-related services and products. A Google file system help in managing the large amount of data which is spread in various databases. A good Google file system is that which have the capability to handle the fault, the replication of data, make the data efficient, memory storage. The large data which is big data must be in the form that it can be managed easily. Many applications like Gmail, Facebook etc. have the file systems which organize the data in relevant format. In conclusion the paper introduces new approaches in distributed file system like spreading file’s data across storage, single master and appends writes etc. Keywords:- GFS, NFS, AFS, HDFS I. INTRODUCTION III. KEY IDEAS The Google file system is designed in such a way that 3.1. Design and Architecture: GFS cluster consist the data which is spread in database must be saved in of single master and multiple chunk servers used by a arrange manner. multiple clients. Since files to be stored in GFS are The arrangement of data is in the way that it can large, processing and transferring such huge files can reduce the overhead load on the server, the consume a lot of bandwidth. To efficiently utilize availability must be increased, throughput should be bandwidth files are divided into large 64 MB size highly aggregated and much more services to make chunks which are identified by unique 64-bit chunk the available data more accurate and reliable.
    [Show full text]
  • Download File
    Annex 2: List of tested and analyzed data sharing tools (non-exhaustive) Below are the specifications of the tools surveyed, as to February 2015, with some updates from April 2016. The tools selected in the context of EU BON are available in the main text of the publication and are described in more details. This list is also available on the EU BON Helpdesk website, where it will be regularly updated as needed. Additional lists are available through the GBIF resources page, the DataONE software tools catalogue, the BioVel BiodiversityCatalogue and the BDTracker A.1 GBIF Integrated Publishing Toolkit (IPT) Main usage, purpose, selected examples The Integrated Publishing Toolkit is a free open source software tool written in Java which is used to publish and share biodiversity data sets and metadata through the GBIF network. Designed for interoperability, it enables the publishing of content in databases or text files using open standards, namely, the Darwin Core and the Ecological Metadata Language. It also provides a 'one-click' service to convert data set metadata into a draft data paper manuscript for submission to a peer-reviewed journal. Currently, the IPT supports three core types of data: checklists, occurrence datasets and sample based data (plus datasets at metadata level only). The IPT is a community-driven tool. Core development happens at the GBIF Secretariat but the coding, documentation, and internationalization are a community effort. New versions incorporate the feedback from the people who actually use the IPT. In this way, users can help get the features they want by becoming involved. The user interface of the IPT has so far been translated into six languages: English, French, Spanish, Traditional Chinese, Brazilian Portuguese, Japanese (Robertson et al, 2014).
    [Show full text]
  • System and Organization Controls (SOC) 3 Report Over the Google Cloud Platform System Relevant to Security, Availability, and Confidentiality
    System and Organization Controls (SOC) 3 Report over the Google Cloud Platform System Relevant to Security, Availability, and Confidentiality For the Period 1 May 2020 to 30 April 2021 Google LLC 1600 Amphitheatre Parkway Mountain View, CA, 94043 650 253-0000 main Google.com Management’s Report of Its Assertions on the Effectiveness of Its Controls Over the Google Cloud Platform System Based on the Trust Services Criteria for Security, Availability, and Confidentiality We, as management of Google LLC ("Google" or "the Company") are responsible for: • Identifying the Google Cloud Platform System (System) and describing the boundaries of the System, which are presented in Attachment A • Identifying our service commitments and system requirements • Identifying the risks that would threaten the achievement of its service commitments and system requirements that are the objectives of our System, which are presented in Attachment B • Identifying, designing, implementing, operating, and monitoring effective controls over the Google Cloud Platform System (System) to mitigate risks that threaten the achievement of the service commitments and system requirements • Selecting the trust services categories that are the basis of our assertion We assert that the controls over the System were effective throughout the period 1 May 2020 to 30 April 2021, to provide reasonable assurance that the service commitments and system requirements were achieved based on the criteria relevant to security, availability, and confidentiality set forth in the AICPA’s
    [Show full text]
  • F1 Query: Declarative Querying at Scale
    F1 Query: Declarative Querying at Scale Bart Samwel John Cieslewicz Ben Handy Jason Govig Petros Venetis Chanjun Yang Keith Peters Jeff Shute Daniel Tenedorio Himani Apte Felix Weigel David Wilhite Jiacheng Yang Jun Xu Jiexing Li Zhan Yuan Craig Chasseur Qiang Zeng Ian Rae Anurag Biyani Andrew Harn Yang Xia Andrey Gubichev Amr El-Helw Orri Erling Zhepeng Yan Mohan Yang Yiqun Wei Thanh Do Colin Zheng Goetz Graefe Somayeh Sardashti Ahmed M. Aly Divy Agrawal Ashish Gupta Shiv Venkataraman Google LLC [email protected] ABSTRACT 1. INTRODUCTION F1 Query is a stand-alone, federated query processing platform The data processing and analysis use cases in large organiza- that executes SQL queries against data stored in different file- tions like Google exhibit diverse requirements in data sizes, la- based formats as well as different storage systems at Google (e.g., tency, data sources and sinks, freshness, and the need for custom Bigtable, Spanner, Google Spreadsheets, etc.). F1 Query elimi- business logic. As a result, many data processing systems focus on nates the need to maintain the traditional distinction between dif- a particular slice of this requirements space, for instance on either ferent types of data processing workloads by simultaneously sup- transactional-style queries, medium-sized OLAP queries, or huge porting: (i) OLTP-style point queries that affect only a few records; Extract-Transform-Load (ETL) pipelines. Some systems are highly (ii) low-latency OLAP querying of large amounts of data; and (iii) extensible, while others are not. Some systems function mostly as a large ETL pipelines. F1 Query has also significantly reduced the closed silo, while others can easily pull in data from other sources.
    [Show full text]
  • A Study of Cryptographic File Systems in Userspace
    Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021), 4507-4513 Research Article A study of cryptographic file systems in userspace a b c d e f Sahil Naphade , Ajinkya Kulkarni Yash Kulkarni , Yash Patil , Kaushik Lathiya , Sachin Pande a Department of Information Technology PICT, Pune, India [email protected] b Department of Information Technology PICT, Pune, India [email protected] c Department of Information Technology PICT, Pune, India [email protected] d Department of Information Technology PICT, Pune, India [email protected] e Veritas Technologies Pune, India, [email protected] f Department of Information Technology PICT, Pune, India [email protected] Article History: Received: 10 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published online: 28 April 2021 Abstract: With the advancements in technology and digitization, the data storage needs are expanding; along with the data breaches which can expose sensitive data to the world. Thus, the security of the stored data is extremely important. Conventionally, there are two methods of storage of the data, the first being hiding the data and the second being encryption of the data. However, finding out hidden data is simple, and thus, is very unreliable. The second method, which is encryption, allows for accessing the data by only the person who encrypted the data using his passkey, thus allowing for higher security. Typically, a file system is implemented in the kernel of the operating systems. However, with an increase in the complexity of the traditional file systems like ext3 and ext4, the ones that are based in the userspace of the OS are now allowing for additional features on top of them, such as encryption-decryption and compression.
    [Show full text]
  • Containers at Google
    Build What’s Next A Google Cloud Perspective Thomas Lichtenstein Customer Engineer, Google Cloud [email protected] 7 Cloud products with 1 billion users Google Cloud in DACH HAM BER ● New cloud region Germany Google Cloud Offices FRA Google Cloud Region (> 50% latency reduction) 3 Germany with 3 zones ● Commitment to GDPR MUC VIE compliance ZRH ● Partnership with MUC IoT platform connects nearly Manages “We found that Google Ads has the best system for 50 brands 250M+ precisely targeting customer segments in both the B2B with thousands of smart data sets per week and 3.5M and B2C spaces. It used to be hard to gain the right products searches per month via IoT platform insights to accurately measure our marketing spend and impacts. With Google Analytics, we can better connect the omnichannel customer journey.” Conrad is disrupting online retail with new Aleš Drábek, Chief Digital and Disruption Officer, Conrad Electronic services for mobility and IoT-enabled devices. Solution As Conrad transitions from a B2C retailer to an advanced B2B and Supports B2C platform for electronic products, it is using Google solutions to grow its customer base, develop on a reliable cloud infrastructure, Supports and digitize its workplaces and retail stores. Products Used 5x Mobile-First G Suite, Google Ads, Google Analytics, Google Chrome Enterprise, Google Chromebooks, Google Cloud Translation API, Google Cloud the IoT connections vs. strategy Vision API, Google Home, Apigee competitors Industry: Retail; Region: EMEA Number of Automate Everything running
    [Show full text]
  • Beginning Java Google App Engine
    apress.com Kyle Roche, Jeff Douglas Beginning Java Google App Engine A book on the popular Google App Engine that is focused specifically for the huge number of Java developers who are interested in it Kyle Roche is a practicing developer and user of Java technologies and the Google App Engine for building Java-based Cloud applications or Software as a Service (SaaS) Cloud Computing is a hot technology concept and growing marketplace that drives interest in this title as well Google App Engine is one of the key technologies to emerge in recent years to help you build scalable web applications even if you have limited previous experience. If you are a Java 1st ed., 264 p. programmer, this book offers you a Java approach to beginning Google App Engine. You will explore the runtime environment, front-end technologies like Google Web Toolkit, Adobe Flex, Printed book and the datastore behind App Engine. You'll also explore Java support on App Engine from end Softcover to end. The journey begins with a look at the Google Plugin for Eclipse and finishes with a 38,99 € | £35.49 | $44.99 working web application that uses Google Web Toolkit, Google Accounts, and Bigtable. Along [1]41,72 € (D) | 42,89 € (A) | CHF the way, you'll dig deeply into the services that are available to access the datastore with a 52,05 focus on Java Data Objects (JDO), JDOQL, and other aspects of Bigtable. With this solid foundation in place, you'll then be ready to tackle some of the more advanced topics like eBook integration with other cloud platforms such as Salesforce.com and Google Wave.
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • Mapreduce: Simplified Data Processing On
    MapReduce: Simplified Data Processing on Large Clusters Jeffrey Dean and Sanjay Ghemawat [email protected], [email protected] Google, Inc. Abstract given day, etc. Most such computations are conceptu- ally straightforward. However, the input data is usually MapReduce is a programming model and an associ- large and the computations have to be distributed across ated implementation for processing and generating large hundreds or thousands of machines in order to finish in data sets. Users specify a map function that processes a a reasonable amount of time. The issues of how to par- key/value pair to generate a set of intermediate key/value allelize the computation, distribute the data, and handle pairs, and a reduce function that merges all intermediate failures conspire to obscure the original simple compu- values associated with the same intermediate key. Many tation with large amounts of complex code to deal with real world tasks are expressible in this model, as shown these issues. in the paper. As a reaction to this complexity, we designed a new Programs written in this functional style are automati- abstraction that allows us to express the simple computa- cally parallelized and executed on a large cluster of com- tions we were trying to perform but hides the messy de- modity machines. The run-time system takes care of the tails of parallelization, fault-tolerance, data distribution details of partitioning the input data, scheduling the pro- and load balancing in a library. Our abstraction is in- gram's execution across a set of machines, handling ma- spired by the map and reduce primitives present in Lisp chine failures, and managing the required inter-machine and many other functional languages.
    [Show full text]
  • Migrating Your Databases to Managed Services on Google Cloud Table of Contents
    White paper June 2021 Migrating your databases to managed services on Google Cloud Table of Contents Introduction 3 Why choose cloud databases 3 The benefits of Google Cloud’s managed database services 5 Maximum compatibility for your workloads 6 For Oracle workloads: Bare Metal Solution for Oracle 8 For SQL Server workloads: Cloud SQL for SQL Server 10 For MySQL workloads: Cloud SQL for MySQL 12 For PostgreSQL workloads: Cloud SQL for PostgreSQL 14 For Redis and Memcached workloads: Memorystore 16 For Redis: Redis Enterprise Cloud 17 For Apache HBase workloads: Cloud Bigtable 19 For MongoDB workloads: MongoDB Atlas 20 For Apache Cassandra workloads: Datastax Astra 22 For Neo4j workloads: Neo4j Aura 23 For InfluxDB workloads: InfluxDB Cloud 25 Migrations that are simple, reliable, and secure 27 Assessing and planning your migration 27 Google Cloud streamlines your migrations 28 Google Cloud services and tools 28 Self-serve migration resources 28 Database migration technology partners 29 Google Professional Services 29 Systems integrators 29 Get started today 29 3 Introduction This paper is for technology decision makers, developers, architects, and DBAs. It focuses on modernizing database deployments with database services on Google Cloud. These services prioritize compatibility and simplicity of management, and include options for Oracle, SQL Server, MySQL, PostgreSQL, Redis, MongoDB, Cassandra, Neo4j, and other popular databases. To transform your business applications, consider Google Cloud native databases. For strategic applications that don’t go down, need on-demand and unlimited scalability, advanced security, and accelerated application development, Google provides the same cloud native database services that power thousands of applications at Google, including services like Google Search, Gmail, and YouTube with billions of users across the globe.
    [Show full text]
  • A Bridge to the Cloud Damien Contreras ダミアン コントレラ Customer Engineer Specialist, Data Analytics, Google Cloud アジェンダ
    A bridge to the Cloud Damien Contreras ダミアン コントレラ Customer Engineer Specialist, Data Analytics, Google Cloud アジェンダ 1 2 4 5 6 はじめに 移行する前の DWHの移行 GCP と連動 データの表示 準備 について はじめに 01 移行する前に| データウェアハウスの欠点 リアルタイムの負担は受 データ増加 けられない コスト データ形式対応外 セルフサービス分析 が難 しい ベンダーロックイン の心 スタースキーマとディメン 配 表ションとファクト表に合わ せる 移行する前に | データレイクの欠点 コスト クラスターのリソースの バージョンアップ バランス 複数のデータレイクが構築 パートナー、人材採用が困 される 難 移行する前に | Google Cloud の価値 コストパフォーマン 弾力性のある構 セキュリティー スが良い サイロはない サーバーレスでNo-ops ANSI SQL-2011 移行をする前に考 えること 02 Partners Cloud plan & cloud deploy 移行する前に | 社内にスキルはない場合 グーグルの支援 パートナーと BigQuery のスター Google リソースが ターパック 協力し合う https://cloud.google.com/partner s/?hl=ja 移行する前に | TCO & ROI アンケートを記入するだけ で 総所有コストのも計算 移行する前に | クラウドで構築 サイロ化に 2 3 なっている 1 データセット データと関連データの Proof of 基盤を構築 発見 Concept 誰でも ML を 使えれるよう 6 5 4 に 機械学習 ソースデータを 周りのシステム 移行 と通信用のツー ルの構築 DWH の移行について03 移行する前に | DWH移行対応 t n r m h o s v b ? Teradata IBM AWS Azure SQL Hadoop Oracle Snowfake Verica SAP BW その他 Netezza Redshif BigQuery t Teradata IBM Netezza から 13 IBM Netezza | アーキテクチャ FPGA CPU メモリー NZSQLコマンド:DML, データダンプ Host FPGA CPU (Linux JDBCコネクター:SQLクエリ メモリー サー バ) FPGA CPU Symmetric Multiprocessing メモリー (SMP)複数のマイクロプロセッサ Disk S-Blade Network Enclosure fabric AMPP Massively Parallel Processing Architecture (MPP) 大量な並行処理 IBM Netezza | データタイプ IBM Netezza の 31 タイプを全部 BigQuery でマッピングが出来ます IBM Netezza BigQuery VARCHAR STRING BOOLEANま BigQuery : TRUE / FALSE BOOL たBOOL Netezza : True / False, 1 / 0, yes / no, on / of TIME / TIMETZ / TIME BigQuery : の TIME でタイムゾーンはない TIME_WITH_TI ME_ZONE ARRAY Netezza : VARCHARのデータタイプに保存 IBM
    [Show full text]